mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-25 07:29:24 -05:00
Update CVE patchers
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
093df020a2
commit
fa6322126d
@ -1 +1 @@
|
||||
Subproject commit 0d85b40ce208cdd87f3ea71a9f3d3aa3c9a08f52
|
||||
Subproject commit 537236b3c1b9e386696834f567098662821e171f
|
@ -1 +1 @@
|
||||
Subproject commit 9e479b9b8623a38621a3195b10734322b8108bf5
|
||||
Subproject commit 9175f3a1f4b0c6fe148cbfb1d55405b686454f7e
|
@ -643,7 +643,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
@ -679,6 +679,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45871/4.14/0002.patch
|
||||
@ -884,6 +885,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -902,7 +904,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -919,7 +921,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p919"
|
||||
editKernelLocalversion "-dos.p921"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -589,6 +589,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
|
||||
@ -798,7 +799,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p798"
|
||||
editKernelLocalversion "-dos.p799"
|
||||
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -218,6 +218,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
@ -346,6 +347,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
|
||||
@ -433,7 +436,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p433"
|
||||
editKernelLocalversion "-dos.p436"
|
||||
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -724,7 +724,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
@ -753,6 +753,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33114/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
|
||||
@ -763,6 +764,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45871/4.14/0002.patch
|
||||
@ -962,6 +964,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -980,7 +983,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -1000,7 +1003,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p1000"
|
||||
editKernelLocalversion "-dos.p1003"
|
||||
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -255,6 +255,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
@ -377,6 +378,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26955/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch
|
||||
@ -463,7 +466,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p463"
|
||||
editKernelLocalversion "-dos.p466"
|
||||
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -127,6 +127,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch
|
||||
@ -138,6 +139,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33110/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33120/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34324/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch
|
||||
@ -149,6 +152,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
@ -253,6 +257,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
|
||||
@ -314,6 +320,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch
|
||||
@ -328,7 +335,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -347,7 +354,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p347"
|
||||
editKernelLocalversion "-dos.p354"
|
||||
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -277,6 +277,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35973/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35976/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
|
||||
@ -303,6 +304,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -325,7 +327,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -343,7 +345,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p343"
|
||||
editKernelLocalversion "-dos.p345"
|
||||
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -202,6 +202,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
@ -322,6 +323,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
|
||||
@ -409,7 +412,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p409"
|
||||
editKernelLocalversion "-dos.p412"
|
||||
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -277,6 +277,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35973/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35976/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
|
||||
@ -303,6 +304,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -325,7 +327,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -343,7 +345,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p343"
|
||||
editKernelLocalversion "-dos.p345"
|
||||
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -666,6 +666,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36489/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36889/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36894/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36904/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36905/5.10/0003.patch
|
||||
@ -683,7 +684,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36957/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36978/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36974/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36978/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/5.10/0003.patch
|
||||
@ -713,7 +716,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/5.10/0003.patch
|
||||
@ -740,7 +743,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
editKernelLocalversion "-dos.p740"
|
||||
editKernelLocalversion "-dos.p743"
|
||||
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -664,6 +664,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36489/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36889/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36894/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36904/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36905/5.10/0003.patch
|
||||
@ -681,7 +682,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36957/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36978/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36974/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36978/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/5.10/0003.patch
|
||||
@ -711,7 +714,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/5.10/0003.patch
|
||||
@ -738,7 +741,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
editKernelLocalversion "-dos.p738"
|
||||
editKernelLocalversion "-dos.p741"
|
||||
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -102,6 +102,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28554/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.19/0007.patch
|
||||
@ -286,6 +287,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -304,7 +306,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -319,7 +321,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p319"
|
||||
editKernelLocalversion "-dos.p321"
|
||||
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -132,6 +132,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch
|
||||
@ -154,6 +155,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
@ -256,6 +258,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
|
||||
@ -316,6 +320,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch
|
||||
@ -329,7 +334,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -348,7 +353,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p348"
|
||||
editKernelLocalversion "-dos.p353"
|
||||
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -481,6 +481,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35973/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35976/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
|
||||
@ -504,6 +505,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -524,7 +526,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -542,7 +544,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p542"
|
||||
editKernelLocalversion "-dos.p544"
|
||||
else echo "kernel_google_redbull is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -218,6 +218,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
@ -341,6 +342,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26955/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch
|
||||
@ -429,7 +432,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p429"
|
||||
editKernelLocalversion "-dos.p432"
|
||||
else echo "kernel_google_wahoo is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -202,6 +202,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
@ -322,6 +323,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
|
||||
@ -409,7 +412,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p409"
|
||||
editKernelLocalversion "-dos.p412"
|
||||
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -205,6 +205,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
@ -326,6 +327,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
|
||||
@ -413,7 +416,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p413"
|
||||
editKernelLocalversion "-dos.p416"
|
||||
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -127,6 +127,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch
|
||||
@ -150,6 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
@ -255,6 +257,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
|
||||
@ -318,6 +322,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch
|
||||
@ -332,7 +337,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -351,7 +356,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p351"
|
||||
editKernelLocalversion "-dos.p356"
|
||||
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -328,6 +328,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35973/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35976/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
|
||||
@ -354,6 +355,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -376,7 +378,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -394,7 +396,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p394"
|
||||
editKernelLocalversion "-dos.p396"
|
||||
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -691,7 +691,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
@ -720,6 +720,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33114/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
|
||||
@ -730,6 +731,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45871/4.14/0002.patch
|
||||
@ -929,6 +931,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -947,7 +950,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -966,7 +969,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p966"
|
||||
editKernelLocalversion "-dos.p969"
|
||||
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -275,6 +275,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35973/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35976/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
|
||||
@ -301,6 +302,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -323,7 +325,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -341,7 +343,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p341"
|
||||
editKernelLocalversion "-dos.p343"
|
||||
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -63,6 +63,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7042/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
@ -347,7 +348,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36978/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36974/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36978/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/5.4/0005.patch
|
||||
@ -372,7 +375,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/5.4/0005.patch
|
||||
@ -394,7 +397,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
|
||||
editKernelLocalversion "-dos.p394"
|
||||
editKernelLocalversion "-dos.p397"
|
||||
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -202,6 +202,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
@ -322,6 +323,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
|
||||
@ -409,7 +412,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p409"
|
||||
editKernelLocalversion "-dos.p412"
|
||||
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -253,6 +253,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
|
||||
@ -316,6 +318,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch
|
||||
@ -330,7 +333,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -349,7 +352,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p349"
|
||||
editKernelLocalversion "-dos.p352"
|
||||
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -758,6 +758,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch
|
||||
@ -921,6 +922,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36894/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.19/0002.patch
|
||||
@ -928,6 +930,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch
|
||||
@ -942,7 +945,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -958,7 +961,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p958"
|
||||
editKernelLocalversion "-dos.p961"
|
||||
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -214,6 +214,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
@ -341,6 +342,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26955/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch
|
||||
@ -426,7 +429,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p426"
|
||||
editKernelLocalversion "-dos.p429"
|
||||
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -602,6 +602,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch
|
||||
@ -621,6 +622,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33110/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33120/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
|
||||
@ -631,6 +634,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
@ -787,6 +791,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch
|
||||
@ -801,7 +806,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -822,7 +827,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p822"
|
||||
editKernelLocalversion "-dos.p827"
|
||||
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -124,6 +124,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch
|
||||
@ -137,6 +138,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33019/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33110/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33120/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34324/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch
|
||||
@ -252,6 +255,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26926/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.19/0003.patch
|
||||
@ -314,6 +319,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch
|
||||
@ -328,7 +334,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -347,7 +353,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p347"
|
||||
editKernelLocalversion "-dos.p353"
|
||||
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -129,6 +129,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch
|
||||
@ -142,6 +143,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33110/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33120/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34324/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch
|
||||
@ -153,6 +156,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
@ -258,6 +262,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
|
||||
@ -321,6 +327,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch
|
||||
@ -335,7 +342,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -354,7 +361,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p354"
|
||||
editKernelLocalversion "-dos.p361"
|
||||
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -111,7 +111,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-25775/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33114/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
|
||||
@ -320,6 +322,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -338,7 +341,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -353,7 +356,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p353"
|
||||
editKernelLocalversion "-dos.p356"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -160,6 +160,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35973/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35976/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
|
||||
@ -185,6 +186,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -207,7 +209,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -221,7 +223,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39292/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
editKernelLocalversion "-dos.p221"
|
||||
editKernelLocalversion "-dos.p223"
|
||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -109,7 +109,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-25775/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33114/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43550/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.19/0002.patch
|
||||
@ -322,6 +324,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
|
||||
@ -340,7 +343,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
|
||||
@ -355,7 +358,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p355"
|
||||
editKernelLocalversion "-dos.p358"
|
||||
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -213,6 +213,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
|
||||
@ -337,6 +338,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
|
||||
@ -425,7 +428,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directo
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p425"
|
||||
editKernelLocalversion "-dos.p428"
|
||||
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
Loading…
Reference in New Issue
Block a user